Question

In: Computer Science

There are many types of attacks, that hackers will use to gain information or to get...

There are many types of attacks, that hackers will use to gain information or to get ​into a network. Name three types of attacks, what the attacks do and how the attackers use them to gain information or access to your networks.

Solutions

Expert Solution

Types of attacks:

  1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks
  2. Man-in-the-middle (MitM) attack
  3. Phishing and spear phishing attacks
  4. Drive-by attack
  5. Password attack
  6. SQL injection attack
  7. Cross-site scripting (XSS) attack
  8. Eavesdropping attack
  9. Birthday attack
  10. Malware attack

1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks

A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker.

Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later.

There are different types of DoS and DDoS attacks; the most common are

1TCP SYN flood attack

2.teardrop attack

3.smurf attack

4.ping-of-death attack

5.botnets.

2. Man-in-the-middle (MitM) attack

A MitM attack occurs when a hacker inserts itself between the communications of a client and a server. Here are some common types of man-in-the-middle attacks:

1.Session hijacking

In this type of MitM attack, an attacker hijacks a session between a trusted client and network server. The attacking computer substitutes its IP address for the trusted client while the server continues the session, believing it is communicating with the client. For instance, the attack might unfold like this:

  1. A client connects to a server.
  2. The attacker’s computer gains control of the client.
  3. The attacker’s computer disconnects the client from the server.
  4. The attacker’s computer replaces the client’s IP address with its own IP address and
    spoofs the client’s sequence numbers.
  5. The attacker’s computer continues dialog with the server and the server believes it is still communicating with the client.

2.IP Spoofing

IP spoofing is used by an attacker to convince a system that it is communicating with a known, trusted entity and provide the attacker with access to the system. The attacker sends a packet with the IP source address of a known, trusted host instead of its own IP source address to a target host. The target host might accept the packet and act upon it.

3. Phishing and spear phishing attacks

Phishing attack is the practice of sending emails that appear to be from trusted sources with the goal of gaining personal information or influencing users to do something. It combines social engineering and technical trickery. It could involve an attachment to an email that loads malware onto your computer. It could also be a link to an illegitimate website that can trick you into downloading malware or handing over your personal information.

Spear phishing is a very targeted type of phishing activity. Attackers take the time to conduct research into targets and create messages that are personal and relevant. Because of this, spear phishing can be very hard to identify and even harder to defend against. One of the simplest ways that a hacker can conduct a spear phishing attack is email spoofing, which is when the information in the “From” section of the email is falsified, making it appear as if it is coming from someone you know, such as your management or your partner company. Another technique that scammers use to add credibility to their story is website cloning — they copy legitimate websites to fool you into entering personally identifiable information (PII) or login credentials.

To reduce the risk of being phished, you can use these techniques:

  • Critical thinking — Do not accept that an email is the real deal just because you’re busy or stressed or you have 150 other unread messages in your inbox. Stop for a minute and analyze the email.
  • Hovering over the links — Move your mouse over the link, but do not click it! Just let your mouse cursor h over over the link and see where would actually take you. Apply critical thinking to decipher the URL.
  • Analyzing email headers — Email headers define how an email got to your address. The “Reply-to” and “Return-Path” parameters should lead to the same domain as is stated in the email.
  • Sandboxing — You can test email content in a sandbox environment, logging activity from opening the attachment or clicking the links inside the email.

Related Solutions

In class we discussed Transitive Trust. And we covered so many different types of attacks. Do...
In class we discussed Transitive Trust. And we covered so many different types of attacks. Do you think that there may be an attack on Trust? Explain your answer.
San Jose State University has experienced many different types of assaults and attacks over the recent...
San Jose State University has experienced many different types of assaults and attacks over the recent years. Protecting students on campus day and night should be the main concern of the university. Risky Business believes that this is due to the poor lighting on campus to ensure that students feel safe. We believe that motion activated lighting on campus and in the parking garages will deter potential threats. Our project will dive into the scope baseline, project cost, and critical...
Research on buffer overflow attacks. How do the various types of overflow attacks differ? When did...
Research on buffer overflow attacks. How do the various types of overflow attacks differ? When did they first start to occur? What can they do and not do? What must a programmer do to prevent a buffer overflow? Answer briefly in your own words.
For each problem write as many of the following types of data you would get if...
For each problem write as many of the following types of data you would get if you... { discrete, continuous, ordinal, qualitative, quantitative } a) asked people if they like spaghetti. b) asked people how many people live in their house. c) asked people to get on a scale and weighed them. d) asked people to guess the percentage of the population with the coronavirus.
find descriptions of different types of network attacks & share your results
find descriptions of different types of network attacks & share your results
There are many types of ratios that financial analysts use to estimate the health of a...
There are many types of ratios that financial analysts use to estimate the health of a company. One important type focuses on measuring how well a company is actually performing. These are known as "profitability" or "performance" ratios. We can get a sense of whether or not a company is being efficient in its use of assets. It looks at questions such as: Does the company generate a reasonable amount of sales for the assets held? Are its profits reasonable...
What types of information can you get from a food nutrition facts label.
What types of information can you get from a food nutrition facts label.
Companies and organizations use graphics to gain our attention and to convey information. Select three different...
Companies and organizations use graphics to gain our attention and to convey information. Select three different types of graphics that have captured your attention. Explain the type of graphic and why it captured your attention. Be sure to display each graphic in your response.
find articles that deal with application or mobile device security and those types of attacks. You...
find articles that deal with application or mobile device security and those types of attacks. You should have a large depository of these kinds of articles, especially in the mobile device security arena. Where are the biggest issues?
What are CBRNE attacks and what would be their impact? use a table to answer this...
What are CBRNE attacks and what would be their impact? use a table to answer this question.)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT